Search
Keyword: TROJ_AGENT
This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
Other Details This Trojan adds the following lines or registry entries as part of its routine:
This Trojan adds registry entries to enable its automatic execution at every system startup. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It
Other Details This Trojan adds the following lines or registry entries as part of its routine:
Installation This Trojan drops the following files: %System%\captcha.dll (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on
Other Details This Trojan adds the following lines or registry entries as part of its routine:
Installation This Trojan drops the following files: %Start Menu%\Programs\VIRTUAL DESKTOP\DESKTOPLOADER.LNK %Start Menu%\Programs\VIRTUAL DESKTOP\DESKTOP README.LNK %Program Files%\FREE-SOFT\VIRTUAL
Installation This Trojan drops the following files: %User Temp%\46.tmp %User Temp%\54.tmp %User Temp%\3C.tmp %User Temp%\6C.tmp %User Temp%\4C.tmp %User Temp%\40.tmp %User Temp%\63.tmp %User Temp%
Other Details This Trojan adds the following lines or registry entries as part of its routine:
This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
Installation This Trojan drops the following files: %User Temp%\4s\krnln.fnr D:\r2_MG.dat (Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}
This Trojan executes then deletes itself afterward. Installation This Trojan drops the following copies of itself into the affected system: %UserTemp%\{random}.tmp It executes then deletes itself
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It creates
It opens a hidden explorer.exe and calc.exe. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. It may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious